Digital Army 2030: Modernizing Technology at Scale - Part 1

Massive Tech Overhaul to Integrate Data and Insights Across Platforms
Digital Army 2030: Modernizing Technology at Scale - Part 1
Dr. Raj Iyer, CIO of the U.S. Army

Decision dominance is driving the digital transformation of the U.S. Army, which is one of the world's largest employers and a top strategic organization. The Army is not just focusing on technology transformation but also on using data as a strategic asset to become battle-ready. To appropriately respond to cyberthreats from adversaries such as China, the U.S. Army CIO is on a mission - Digital Army 2030.

Through digital transformation, the CIO's office is preparing the Army to take on the battles of the future. Akin to private sector companies, the Army wants to deploy new operating models and services to augment its war-fighting capabilities.

Along with modernizing next-generation combat systems, the Army also wants to do away with its legacy information infrastructure and introduce cloud computing at scale to phase out its 250 data centers, which cannot sustain the requirements of the mission.

The Army has also signed a $1 billion transformation project that will involve large hyperscalers and cloud service providers to modernize and migrate more than 5,000 of its applications in the cloud.

In this interview with Information Security Media Group, Dr. Raj Iyer, CIO of the U.S. Army, discusses:

  • The need for digital transformation to support battle readiness;
  • The shift to cloud-native architecture to leverage cloud for war-fighting capabilities;
  • Application migration and modernization at scale to support war missions and business functions.

In Part 2 of this interview, Iyer shares how zero trust helped cyber command mature to gain offensive and defensive capabilities.

Iyer serves as principal adviser and directs all matters representing the Secretary of the Army for information management and information technology. He sets the strategic direction and oversees the execution of policies and programs for IM/IT, including managing an integrated IT architecture, enterprise data management, cybersecurity and cloud management.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.